IOT306-R: Designing secure IoT solutions from the edge to cloud
AWS re:Invent 2019 - Un pódcast de AWS
Categorías:
Connected devices constantly communicate with each other and the cloud using wireless communication protocols. This communication can expose security vulnerabilities and channels for malicious actors or data leaks. To protect users, devices, and companies, IoT devices must be secured and protected. In this session, we cover the technology and security best practices to continually evaluate your attack surface, analyze threat impact, and act on potential threats to your IoT devices, connections, and the data they generate. Learn how to use AWS IoT to keep data secure, restrict access to devices and cloud resources, securely connect to the cloud, and audit device usage.